期刊文献+

云计算环境下调度算法的趋势分析 被引量:6

Trend Analysis for Scheduling Algorithm in Cloud Computing
在线阅读 下载PDF
导出
摘要 云资源管理是云计算成败的关键,而调度作为云资源管理的重要手段,直接影响到云计算的效果.但是,云计算的异构性与动态性,导致云计算环境下的调度研究复杂和困难.因此,在传统并行分布调度工作的基础上,文中采用五要素刻画调度问题的本质,并且给出每个要素的具体表现形式.通过分析云调度的现有研究成果,结合云计算存在的困难和挑战,指出云计算中调度算法的发展趋势,为将来的云调度研究指明方向和思路. Resource management plays an important role in cloud computing, while scheduling is one of the key techniques in resource management, which has a direct influence on cloud computing. However, due to the heterogeneous and dynamic features in cloud computing, cloud scheduling is complicated and difficult. This paper uses five factors to describe general scheduling problems, and gives examples of different types for each factor. We analyze the traditional scheduling algorithms in parallel and distributed environment, and the current research in cloud computing. And we give the trend for cloud scheduling under its difficulties and challenge. Our work indicates the directions and ideas for future research in cloud scheduling.
出处 《微电子学与计算机》 CSCD 北大核心 2012年第9期103-108,共6页 Microelectronics & Computer
基金 国家自然科学基金项目(61103068) 国家"八六三"计划项目(2009AA012201) NSFC微软亚洲研究院联合资助项目(6097155) 教育部网络时代的科技论文快速共享专项研究课题(20110740001) 教育部博士点基金项目(20090072110035) 上海市优秀学科带头人计划项目(10XD1404400)
关键词 云计算 调度问题 算法综述 趋势分析 cloud computing scheduling problem algorithm survey trend analysis
作者简介 吴煜棋 女,(1987-),硕士研究生.研究方向为并行分布处理、云计算 曾国荪 男,(1964-),博士,教授,博导.研究方向为并行分布计算、可信网络软件
  • 相关文献

参考文献9

  • 1Kwok Y K, Ahmd I. Static scheduling algorithms for allocating directed task graphs to multiprocessors[J]. ACM Computing Surveys, 1999, 31(4) :406-471.
  • 2Huang Y, Bessis N, Norrington P, et al. Exploring decentralized dynamic scheduling for grids and clouds using the community-aware scheduling algorithm[J]. Future Generation Computer Systems, 2011, doi: 10. 1016/j. future. 2011(5):6.
  • 3Lee Y C, Wang C, Zomaya A Y, et al. Profit-driven scheduling for cloud services with data access aware-ness[J]. Journal of Parallel and Distributed Compu- ting, 2012, 74(4): 591-602.
  • 4Abrishami S, Naghibzadeh M. Deadline-constrained workflow scheduling in software as a service cloud[J]. Scientia Iranica, 2011(11) :47.
  • 5Garg S K, Yeo C S, Anandasivam A, et ak Environ- ment-conscious scheduling of HPC applications on dis- tributed cloud-oriented data centers [J]. Journal of Parallel and Distributed Computing, 2011, 71(6) : 732 -749.
  • 6Mezmaz M, Melab N, Kessaci Y, et al. A parallel bi- objective hybrid metaheuristic for energy-aware sched- uling for cloud computing systems[J]. Journal of Par- allel and Distributed Computing, 2011, 71 (11) : 1497- 1508.
  • 7Lucas-Simarro J L, Moreno-Vozmediano R, Montero R S, et al. Scheduling strategies for optimal service deployment across multiple clouds[J]. Future Genera- tion Computer Systems, 2012(1) : 7.
  • 8Xu B M, Zhao C Y, Hu E Z, et al. Job scheduling al- gorithm based on Berger model in cloud environment[J]. Advances in Engineering Software, 2011, 42(7): 419-425.
  • 9Riakiotakis I, Ciorba F M, Papakonstantinou G, et al.Towards the optimal synchronization granularity for dynamic scheduling of pipelined computations on heter- ogeneous computing systems [J]. Concurrency and Computation: Practice and Experience, 2012 (10): 2812.

同被引文献24

  • 1肖艳文,王金宝,李亚平,高宏.云计算系统中能量有效的数据摆放算法和节点调度策略[J].计算机研究与发展,2013,50(S1):342-351. 被引量:9
  • 2董旭,魏振军.一种加权欧氏距离聚类方法[J].信息工程大学学报,2005,6(1):23-25. 被引量:32
  • 3Mell pr, Grance T. The NIST denition of cloud com- puting[J]. NationalInstitute of Standards and Tech- nology, 2009,53(6) : 15-18.
  • 4Brodkin J. GARTNER: Seven cloud- computing se- curity risks. Infoworld, 2008.
  • 5Buyya R, Yeo C S, S Venugopal, et al. Cloud comput- ingand emerging IT platforms: Vision, hype, and re- ality for delivering computing asthe 5th utility[J]. Fu-ture Generation computer systems, 2009, 25 (6) : 25-28.
  • 6Hecht S, Cockburn A. The fate of the forest: devel- opers, destroyers, and de- fenders of the Amazon [D]. University Of Chicago Press, 2011.
  • 7Wang C, Wang Q , K REN,et al. Ensuring data stor- age security in cloud computingEC2//Quality of Serv- ice, 2009. IWQoS. 17th International Workshop on IEEE, 2009: 21-27.
  • 8Yilek S, Rescorla E, H. SHACHAM B, et al. SAV- AGE. When private keys are public: results from the 2008 debian OpenSSL vulnerability[C]// In Proceed- ings of the 9th ACM SIGCOMM conference on Inter- net measurement conference[s. 1. ] : ACM, 2009 : 8-10.
  • 9Dingguo feng, Min zhang, Yan zhang, and Zhen xu. The research of cloud security. Journal of Software, 22 (1) :2011,78-79.
  • 10Kandukuri B R, vr paturi,A Rakshit. Cloud security issues[C]// In Services Computing, 2009. SCC'09. IEEE International Conference on,[ s. 1.] : 1EEE, 517520, 2009:15-16.

引证文献6

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部